Towards Understanding Phishing Victims' Profile

被引:0
|
作者
Darwish, Ali [1 ]
El Zarka, Ahmed [1 ]
Aloul, Fadi [1 ]
机构
[1] Zayed Univ UAE, Coll Informat Technol, Dubai, U Arab Emirates
来源
2012 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND INDUSTRIAL INFORMATICS (ICCSII) | 2012年
关键词
PERSONALITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today it is known that the weakest link in the cyber security chain is the computer user. Social engineering attacks are commonly used to deceive computer users to perform actions that could leak private information. Such attacks psychologically manipulate the computer users to reveal his/her confidential information. Therefore, the computer user has been carefully studied by security researchers to understand the relationship between cyber security incidents and the victim background. In this paper, we present a breadth-first survey of recent studies that aim to understand the relationship between victims' backgrounds and phishing attacks. We summarize the characteristics of the phishing victims, following a review of their demographic and personality traits.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials
    Thomas, Kurt
    Li, Frank
    Zand, Ali
    Barrett, Jacob
    Ranieri, Juri
    Invernizzi, Luca
    Markov, Yarik
    Comanescu, Oxana
    Eranti, Vijay
    Moscicki, Angelika
    Margolis, Daniel
    Paxson, Vern
    Bursztein, Elie
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1421 - 1434
  • [32] Where Did They Go Right? Understanding the Deception in Phishing Communications
    Ryan Wright
    Suranjan Chakraborty
    Asli Basoglu
    Kent Marett
    Group Decision and Negotiation, 2010, 19 : 391 - 416
  • [33] Towards Detecting Phishing Web Contents for Secure Internet Surfing
    Sadi, Muhammad Sheikh
    Khan, Md. Mizanur Rahman
    Islam, Md. Merazul
    Srijon, Shuvradeb Barman
    Mia, Md. Mahmudul Haque
    2012 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2012, : 237 - 241
  • [34] Towards a Hybrid Security Framework for Phishing Awareness Education and Defense
    Loh, Peter K. K.
    Lee, Aloysius Z. Y.
    Balachandran, Vivek
    FUTURE INTERNET, 2024, 16 (03)
  • [35] RAPE - SKEPTICISM TOWARDS VICTIMS STATEMENT
    不详
    KRIMINALISTIK, 1979, (04): : 166 - 166
  • [36] TOWARDS BETTER CARE OF ACCIDENT VICTIMS
    KELLY, W
    MEDICAL JOURNAL OF AUSTRALIA, 1962, 2 (18) : 724 - &
  • [37] TOWARDS BETTER CARE OF ACCIDENT VICTIMS
    VANDERFIELD, G
    MEDICAL JOURNAL OF AUSTRALIA, 1962, 2 (09) : 354 - +
  • [38] Towards Enhanced Security: An improved approach to Phishing Email Detection
    Sambare, G. B.
    Galande, Shailesh B.
    Kale, Sharvari
    Nehete, Pragati
    Jadhav, Vaishnavi
    Tadavi, Nihal
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (02) : 2763 - 2772
  • [39] Characterizing minimal interval completions towards better understanding of profile and pathwidth - (Extended abstract)
    Heggernes, Pinar
    Suchan, Karol
    Todinca, Loan
    Villanger, Yngve
    STACS 2007, PROCEEDINGS, 2007, 4393 : 236 - +
  • [40] Understanding Human Wildlife conflicts in rapidly expanding urban complexes: Epidemiological profile of snakebite victims indicates builders are at risk
    Gbogbo, F.
    Nunoo, H.
    INTERNATIONAL JOURNAL OF ECOLOGICAL ECONOMICS & STATISTICS, 2015, 36 (04) : 95 - 103